xaudio2_3.pdb
Static task
static1
Behavioral task
behavioral1
Sample
5345e073246cd403d58466e9d1670640N.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5345e073246cd403d58466e9d1670640N.dll
Resource
win10v2004-20240709-en
General
-
Target
5345e073246cd403d58466e9d1670640N.exe
-
Size
775KB
-
MD5
5345e073246cd403d58466e9d1670640
-
SHA1
132a97bef919ac29d4ed99f4618db940915d2730
-
SHA256
dc63b4b58b3c534f4ec4aae3d5efdeeff33da6b0243b7b647991c1f550508975
-
SHA512
faa8ae4267d0f74c6b12d7e91069310a87761b7fea14d5838b0963a8196250e2552850c8f3a7f7d7551cb322f865500719583432b3d9df81ba6e73f87d941ffa
-
SSDEEP
12288:RXgvKmhM6ENLu3FKfjRIw9EeupZkM/NDuNgYvlnruo8uUcXQMJBmPhHS:tt9NjRIwwpSM/JuJrICTByc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5345e073246cd403d58466e9d1670640N.exe
Files
-
5345e073246cd403d58466e9d1670640N.exe.dll regsvr32 windows:6 windows x86 arch:x86
07251bd5f22f6000eb2c22a92806cc8f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
msvcrt
memset
_amsg_exit
_initterm
free
malloc
_XcptFilter
ceil
_CIpow
_control87
strlen
_purecall
memmove
_vsnprintf
_adjust_fdiv
memcmp
memcpy
_aligned_malloc
_aligned_free
strcmp
wcslen
_vsnwprintf
sin
cos
floor
sqrt
kernel32
FreeLibrary
WaitForSingleObjectEx
CreateThread
ResumeThread
GetProcessAffinityMask
SetThreadAffinityMask
lstrcmpW
GetProcAddress
GetVersionExA
ResetEvent
SetEvent
CreateEventA
CreateSemaphoreA
LoadLibraryA
ReleaseSemaphore
GetProcessHeap
HeapSize
GetSystemInfo
GetVersion
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
RtlUnwind
InterlockedCompareExchange
Sleep
InterlockedExchange
DisableThreadLibraryCalls
SwitchToThread
WaitForSingleObject
DuplicateHandle
WaitForMultipleObjects
CloseHandle
GetModuleFileNameA
GetCurrentThreadId
HeapDestroy
TryEnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
HeapCreate
GetLastError
QueryPerformanceFrequency
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
HeapFree
GetCurrentThread
OutputDebugStringA
InterlockedIncrement
InterlockedDecrement
GetThreadPriority
IsProcessorFeaturePresent
SetThreadPriority
DebugBreak
ole32
PropVariantClear
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CLSIDFromString
user32
MessageBoxA
GetDesktopWindow
rpcrt4
UuidToStringA
RpcStringFreeA
advapi32
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
winmm
timeBeginPeriod
timeEndPeriod
Exports
Exports
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Sections
.text Size: 476KB - Virtual size: 476KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.no_bbt Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 1008B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 293KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ